SSH event and webinar calendar
Upcoming events and webinars
identity & access management summit
May 12-13, 2022 | London, uk
Identity and Access Management (IAM)
Get the latest insights on identity governance and administration, security, and privacy.
Join our CEO, Teemu Tunkelo, for his presentation about the latest developments in defensive cybersecurity. On Friday, May 13th, 2022 at 11:15, room Arora 6.
Come and meet us at the booth 501.
cybersecurity nordic 2022
May 12-13, 2022 | helsinki, finland
Politics, economy, reality and future of cybersecurity
Leading cybersecurity specialists from the Nordics meet to provide insights into current issues within the field of cybersecurity.
Meet us at the booth SI3.
European identity and cloud conference 2022
May 10-13, 2022 | Berlin, Germany
Decentralized identity & cybersecurity
Insights from the industry leaders into the latest cybersecurity trends, digital identity, and identity management.
Identity & Access Management Summit
august 22 – 24, 2022 | Las Vegas, NV
Securing Constant Change: Enabling Resilient Business
Share valuable insights and get a comprehensive update on privileged access management (PAM), IAM programs and strategy, single sign-on, multifactor authentication (MFA), passwordless methods and more.
Past events and webinars
GISEC global 2022
For a cyber-safe, interconnected world
One of the most established networking and business events for the cyber and IT security industry. Drive strategic collaborations and an empowering exchange of new-age cybersecurity tactics and ideas.
Online event
Fix a critical hole in your security posture
A single SSH key can make you fail your next IT audit or turn you into tomorrow’s beach headline. Join our co-hosted webinar with our friends at ISACA to learn how to use purpose-built software and automation to prevent this.
Webinar co-hosted by ISMG
Can SMEs automate access to multi-cloud IT?
Learn how medium-sized companies can automate most of their manual privileged access management (PAM) tasks, deploy the solution within days and manage the access of internal and external IT workforce with minimal risk of privilege abuse.

On-demand Webinar with OneLogin
Saving admins from themselves
Multi-cloud environments (AWS, Azure, Google Cloud) and DevOps require cloud-speed operations. They have also opened new types of vulnerabilities that need new types of counter measures.

IDM London 2019
Say no to standing privileges, go credentialess
Why permanent credentials are a risk in IT and how critical IT environments can be made passwordless and credentialess.

IDM Utrecht 2019
Modern access mgmt for hybrid and multi-cloud
Dynamic hybrid and cloud environments have different privileged user types who need to access shifting target servers. While cloud environments can be complex and ever-changing, many legacy solutions are built on yesterday’s architecture and tend to cause huge operational and business friction.

Event
Angelbeat Boston 2019
The unique event to learn about top IT issues, featuring keynotes from the world's two largest technology firms: Microsoft and Amazon Web Services (AWS).